This post was original published on 27 June 2022 Update 14 July 2022 Here is an article from the Microsoft Threat Intelligence Center (MSTIC) and the Microsoft 365 Defender Research Team outlining how the big phishing campaigns backed by experienced and skilled hackers can bypass the security of multi-factor authentication: …
This is a technology exercise in when everything goes wrong!
I was put onto this blog post via Bruce Schneier’s blog. I’ve locked myself out of my digital life – Terence Eden’s Blog (shkspr.mobi) This is why role play and thinking about your operation, is a vital part of creating a cyber security plan that is resilient and provides for …
Continue reading “This is a technology exercise in when everything goes wrong!”
CISA joint advisory on access control. Are you still missing MFA?
The US Cybersecurity and Infrastructure Security Agency has issued a joint advisory with the cyber security organisations from the UK, New Zealand, Netherlands and Canada listing ten regularly exploited weak security controls, poor configurations, and bad practices that allow threat actors to compromise networks. Here is the article: Weak Security …
Continue reading “CISA joint advisory on access control. Are you still missing MFA?”
Google – “cybersecurity is one of the top issues facing the world today”
The quote is from an article by Royal Hansen, Vice President of Engineering for Privacy, Safety, and Security, outlining how Google sees it’s role in making it a more secure world. Building a secure world (blog.google) I always have a seed of doubt when I read anything like this from …
Continue reading “Google – “cybersecurity is one of the top issues facing the world today””
Google has more ways to keep you safe online from cyber threats and protect your privacy
Google published three articles yesterday, to do with privacy and cyber security, showing how one of the world’s biggest corporations, that primarily depends on processing and using your online information for profit, is going to take steps to protect you. The first promotes the feature, in Google search, where you …